mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 05:47:23 +00:00
Merge pull request #8730 from jsuther1974/WDAC-Docs
Removed claim that user writeable check on filepath rules is done recursively for parent directories
This commit is contained in:
commit
9171922a70
@ -2,7 +2,7 @@
|
|||||||
title: Understand Windows Defender Application Control (WDAC) policy rules and file rules
|
title: Understand Windows Defender Application Control (WDAC) policy rules and file rules
|
||||||
description: Learn how WDAC policy rules and file rules can control your Windows 10 and Windows 11 computers.
|
description: Learn how WDAC policy rules and file rules can control your Windows 10 and Windows 11 computers.
|
||||||
ms.localizationpriority: medium
|
ms.localizationpriority: medium
|
||||||
ms.date: 06/07/2023
|
ms.date: 08/11/2023
|
||||||
ms.topic: article
|
ms.topic: article
|
||||||
---
|
---
|
||||||
|
|
||||||
@ -127,7 +127,7 @@ Filepath rules don't provide the same security guarantees that explicit signer r
|
|||||||
|
|
||||||
### User-writable filepaths
|
### User-writable filepaths
|
||||||
|
|
||||||
By default, WDAC performs a user-writeability check at runtime that ensures that the current permissions on the specified filepath and its parent directories (recursively) don't allow standard users write access.
|
By default, WDAC performs a user-writeability check at runtime that ensures that the current permissions on the specified filepath only allow write access for admin users.
|
||||||
|
|
||||||
There's a defined list of SIDs that WDAC recognizes as admins. If a filepath allows write permissions for any SID not in this list, the filepath is considered to be user-writeable, even if the SID is associated to a custom admin user. To handle these special cases, you can override WDAC's runtime admin-writeable check with the **Disabled:Runtime FilePath Rule Protection** option described earlier.
|
There's a defined list of SIDs that WDAC recognizes as admins. If a filepath allows write permissions for any SID not in this list, the filepath is considered to be user-writeable, even if the SID is associated to a custom admin user. To handle these special cases, you can override WDAC's runtime admin-writeable check with the **Disabled:Runtime FilePath Rule Protection** option described earlier.
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user